Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:01
Behavioral task
behavioral1
Sample
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe
Resource
win7-20221111-en
General
-
Target
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe
-
Size
255KB
-
MD5
4508e3462ab57f779f193428976ba116
-
SHA1
e7198fe50c68ec2269d4e74894d6e2ec4b8f46a3
-
SHA256
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b
-
SHA512
2dac2e0837da9e9a10979444eb520d2a4f4f642070b2c37233c077a9ebfca85666ef3d0b2cf357e416859f1ddf4e5ed23680b4d6c726545c9c0d212a6ed2ffce
-
SSDEEP
3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJh:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" gadeaifqcj.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" gadeaifqcj.exe -
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gadeaifqcj.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" gadeaifqcj.exe -
Executes dropped EXE 5 IoCs
Processes:
gadeaifqcj.exeqmiilncdqrfegfu.exehyjdyjzs.exefmwvbfofxpgna.exehyjdyjzs.exepid process 640 gadeaifqcj.exe 2008 qmiilncdqrfegfu.exe 540 hyjdyjzs.exe 1748 fmwvbfofxpgna.exe 2904 hyjdyjzs.exe -
Processes:
resource yara_rule behavioral2/memory/4956-132-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\gadeaifqcj.exe upx C:\Windows\SysWOW64\gadeaifqcj.exe upx C:\Windows\SysWOW64\qmiilncdqrfegfu.exe upx C:\Windows\SysWOW64\qmiilncdqrfegfu.exe upx C:\Windows\SysWOW64\hyjdyjzs.exe upx C:\Windows\SysWOW64\hyjdyjzs.exe upx C:\Windows\SysWOW64\fmwvbfofxpgna.exe upx C:\Windows\SysWOW64\fmwvbfofxpgna.exe upx behavioral2/memory/640-145-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2008-146-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/540-147-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1748-148-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Windows\SysWOW64\hyjdyjzs.exe upx behavioral2/memory/2904-152-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/4956-153-0x0000000000400000-0x00000000004A0000-memory.dmp upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe upx C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe upx behavioral2/memory/640-164-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2008-165-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/540-166-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/1748-167-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2904-168-0x0000000000400000-0x00000000004A0000-memory.dmp upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe upx behavioral2/memory/540-178-0x0000000000400000-0x00000000004A0000-memory.dmp upx behavioral2/memory/2904-177-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirstRunDisabled = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gadeaifqcj.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
qmiilncdqrfegfu.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run qmiilncdqrfegfu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vcxejxsr = "gadeaifqcj.exe" qmiilncdqrfegfu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\rhwuvcmo = "qmiilncdqrfegfu.exe" qmiilncdqrfegfu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "fmwvbfofxpgna.exe" qmiilncdqrfegfu.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
hyjdyjzs.exehyjdyjzs.exegadeaifqcj.exedescription ioc process File opened (read-only) \??\k: hyjdyjzs.exe File opened (read-only) \??\l: hyjdyjzs.exe File opened (read-only) \??\s: hyjdyjzs.exe File opened (read-only) \??\v: hyjdyjzs.exe File opened (read-only) \??\q: hyjdyjzs.exe File opened (read-only) \??\p: gadeaifqcj.exe File opened (read-only) \??\r: gadeaifqcj.exe File opened (read-only) \??\k: hyjdyjzs.exe File opened (read-only) \??\l: hyjdyjzs.exe File opened (read-only) \??\r: hyjdyjzs.exe File opened (read-only) \??\w: hyjdyjzs.exe File opened (read-only) \??\u: gadeaifqcj.exe File opened (read-only) \??\v: gadeaifqcj.exe File opened (read-only) \??\o: hyjdyjzs.exe File opened (read-only) \??\b: hyjdyjzs.exe File opened (read-only) \??\m: hyjdyjzs.exe File opened (read-only) \??\m: gadeaifqcj.exe File opened (read-only) \??\q: gadeaifqcj.exe File opened (read-only) \??\s: gadeaifqcj.exe File opened (read-only) \??\g: hyjdyjzs.exe File opened (read-only) \??\e: hyjdyjzs.exe File opened (read-only) \??\g: hyjdyjzs.exe File opened (read-only) \??\s: hyjdyjzs.exe File opened (read-only) \??\j: gadeaifqcj.exe File opened (read-only) \??\p: hyjdyjzs.exe File opened (read-only) \??\x: hyjdyjzs.exe File opened (read-only) \??\v: hyjdyjzs.exe File opened (read-only) \??\b: gadeaifqcj.exe File opened (read-only) \??\a: hyjdyjzs.exe File opened (read-only) \??\i: gadeaifqcj.exe File opened (read-only) \??\a: hyjdyjzs.exe File opened (read-only) \??\y: gadeaifqcj.exe File opened (read-only) \??\t: hyjdyjzs.exe File opened (read-only) \??\y: hyjdyjzs.exe File opened (read-only) \??\g: gadeaifqcj.exe File opened (read-only) \??\k: gadeaifqcj.exe File opened (read-only) \??\z: hyjdyjzs.exe File opened (read-only) \??\p: hyjdyjzs.exe File opened (read-only) \??\r: hyjdyjzs.exe File opened (read-only) \??\x: gadeaifqcj.exe File opened (read-only) \??\j: hyjdyjzs.exe File opened (read-only) \??\e: gadeaifqcj.exe File opened (read-only) \??\t: gadeaifqcj.exe File opened (read-only) \??\t: hyjdyjzs.exe File opened (read-only) \??\n: hyjdyjzs.exe File opened (read-only) \??\u: hyjdyjzs.exe File opened (read-only) \??\j: hyjdyjzs.exe File opened (read-only) \??\m: hyjdyjzs.exe File opened (read-only) \??\z: hyjdyjzs.exe File opened (read-only) \??\l: gadeaifqcj.exe File opened (read-only) \??\h: hyjdyjzs.exe File opened (read-only) \??\i: hyjdyjzs.exe File opened (read-only) \??\n: hyjdyjzs.exe File opened (read-only) \??\q: hyjdyjzs.exe File opened (read-only) \??\u: hyjdyjzs.exe File opened (read-only) \??\n: gadeaifqcj.exe File opened (read-only) \??\o: gadeaifqcj.exe File opened (read-only) \??\x: hyjdyjzs.exe File opened (read-only) \??\f: gadeaifqcj.exe File opened (read-only) \??\h: gadeaifqcj.exe File opened (read-only) \??\z: gadeaifqcj.exe File opened (read-only) \??\b: hyjdyjzs.exe File opened (read-only) \??\f: hyjdyjzs.exe File opened (read-only) \??\i: hyjdyjzs.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
gadeaifqcj.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCScan = "0" gadeaifqcj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable = "4294967197" gadeaifqcj.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/640-145-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2008-146-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/540-147-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1748-148-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/4956-153-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/640-164-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2008-165-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/540-166-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/1748-167-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2904-168-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/540-178-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe behavioral2/memory/2904-177-0x0000000000400000-0x00000000004A0000-memory.dmp autoit_exe -
Drops file in System32 directory 13 IoCs
Processes:
hyjdyjzs.exe86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exegadeaifqcj.exehyjdyjzs.exedescription ioc process File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification C:\Windows\SysWOW64\gadeaifqcj.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\hyjdyjzs.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll gadeaifqcj.exe File opened for modification C:\Windows\SysWOW64\hyjdyjzs.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\fmwvbfofxpgna.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\fmwvbfofxpgna.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\SysWOW64\MSDRM\MsoIrmProtector.doc.exe hyjdyjzs.exe File created C:\Windows\SysWOW64\gadeaifqcj.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File created C:\Windows\SysWOW64\qmiilncdqrfegfu.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\SysWOW64\qmiilncdqrfegfu.exe 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe -
Drops file in Program Files directory 14 IoCs
Processes:
hyjdyjzs.exehyjdyjzs.exedescription ioc process File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hyjdyjzs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hyjdyjzs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hyjdyjzs.exe File created \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hyjdyjzs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hyjdyjzs.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.exe hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.nal hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.DOC.exe hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hyjdyjzs.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLV.nal hyjdyjzs.exe -
Drops file in Windows directory 19 IoCs
Processes:
hyjdyjzs.exe86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exeWINWORD.EXEhyjdyjzs.exedescription ioc process File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification C:\Windows\mydoc.rtf 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe File opened for modification C:\Windows\mydoc.rtf WINWORD.EXE File created C:\Windows\~$mydoc.rtf WINWORD.EXE File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_ebc47b06544bfaab\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\amd64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_c3bc3dbd94da3c61\MsoIrmProtector.doc.exe hyjdyjzs.exe File opened for modification \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.1_none_ce10e80fc93afe5c\MsoIrmProtector.doc.exe hyjdyjzs.exe File created \??\c:\Windows\WinSxS\wow64_microsoft-windows-r..t-office-protectors_31bf3856ad364e35_10.0.19041.746_none_f619255888acbca6\MsoIrmProtector.doc.exe hyjdyjzs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Modifies registry class 20 IoCs
Processes:
gadeaifqcj.exe86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSF\ = "txtfile" gadeaifqcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB4FAB9F964F190837C3B3086983995B38E038F4315033CE1C942E609D6" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E0F76BB6FF6C21DDD27AD1A68B7A9013" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "1939C67914E5DBBEB9B97CE7ED9334C6" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc\ = "txtfile" gadeaifqcj.exe Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7E8CFF8A4F2782689141D7217DE1BD92E643584767406330D7EC" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsf gadeaifqcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gadeaifqcj.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "33442C799C2D83236A4676A070202DDF7DF664AA" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2FC3B05847E4399F52BEBAA7339FD4C5" 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsh gadeaifqcj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.WSH\ = "txtfile" gadeaifqcj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wsc gadeaifqcj.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3920 WINWORD.EXE 3920 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exegadeaifqcj.exeqmiilncdqrfegfu.exehyjdyjzs.exefmwvbfofxpgna.exepid process 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exegadeaifqcj.exeqmiilncdqrfegfu.exehyjdyjzs.exefmwvbfofxpgna.exehyjdyjzs.exepid process 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 2904 hyjdyjzs.exe 2904 hyjdyjzs.exe 2904 hyjdyjzs.exe -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exegadeaifqcj.exeqmiilncdqrfegfu.exehyjdyjzs.exefmwvbfofxpgna.exehyjdyjzs.exepid process 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 640 gadeaifqcj.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 2008 qmiilncdqrfegfu.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 540 hyjdyjzs.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 1748 fmwvbfofxpgna.exe 2904 hyjdyjzs.exe 2904 hyjdyjzs.exe 2904 hyjdyjzs.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3920 WINWORD.EXE 3920 WINWORD.EXE 3920 WINWORD.EXE 3920 WINWORD.EXE 3920 WINWORD.EXE 3920 WINWORD.EXE 3920 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exegadeaifqcj.exedescription pid process target process PID 4956 wrote to memory of 640 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe gadeaifqcj.exe PID 4956 wrote to memory of 640 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe gadeaifqcj.exe PID 4956 wrote to memory of 640 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe gadeaifqcj.exe PID 4956 wrote to memory of 2008 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe qmiilncdqrfegfu.exe PID 4956 wrote to memory of 2008 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe qmiilncdqrfegfu.exe PID 4956 wrote to memory of 2008 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe qmiilncdqrfegfu.exe PID 4956 wrote to memory of 540 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe hyjdyjzs.exe PID 4956 wrote to memory of 540 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe hyjdyjzs.exe PID 4956 wrote to memory of 540 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe hyjdyjzs.exe PID 4956 wrote to memory of 1748 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe fmwvbfofxpgna.exe PID 4956 wrote to memory of 1748 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe fmwvbfofxpgna.exe PID 4956 wrote to memory of 1748 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe fmwvbfofxpgna.exe PID 4956 wrote to memory of 3920 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 4956 wrote to memory of 3920 4956 86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe WINWORD.EXE PID 640 wrote to memory of 2904 640 gadeaifqcj.exe hyjdyjzs.exe PID 640 wrote to memory of 2904 640 gadeaifqcj.exe hyjdyjzs.exe PID 640 wrote to memory of 2904 640 gadeaifqcj.exe hyjdyjzs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe"C:\Users\Admin\AppData\Local\Temp\86749c59137ad592187e0486ba87f5f5a7479dc0100ac7b1945b6de95d460c3b.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\gadeaifqcj.exegadeaifqcj.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\hyjdyjzs.exeC:\Windows\system32\hyjdyjzs.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2904 -
C:\Windows\SysWOW64\qmiilncdqrfegfu.exeqmiilncdqrfegfu.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2008 -
C:\Windows\SysWOW64\hyjdyjzs.exehyjdyjzs.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:540 -
C:\Windows\SysWOW64\fmwvbfofxpgna.exefmwvbfofxpgna.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1748 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""2⤵
- Drops file in Windows directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3920
Network
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
6Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD59584b475cef253e0b8d87f97b8202aea
SHA1a4670d9e6e2fbf2e78a613310651fef40717c3f0
SHA256887607f48aa0b41e7c6e3dc2664c4ca429fc7e719270cf7de404809db2c39ec1
SHA512337f7f64f36f5e7464705e72195e3324016f8650b49589f788c02710ca1dd693d3ccef48422f4d9afc3cf3671d97cc492dd9ee95aab46b591ff333d6f4659448
-
Filesize
255KB
MD5a6d5fa2d4664bd76d7e903f32a687f87
SHA196b77590648ff6fbbfcaf32ff4c134b43cffb788
SHA25645fe5ad27700480664d77a251318b3dec1b850627572c3d4f3090e0ef2f0f058
SHA5129b2d6d266b4aba58234afafd08ba2de190f9689d78d73d2e01006ea5c11ad48a942378c4facb88b71c441e2b53e29dad89804f00f6bacb927683df62110b881d
-
Filesize
255KB
MD50e2ce57d6cc69def134e2bbaf828dbad
SHA1474d332e26d2e36da4e7f31a770f656985479ae2
SHA256ba9e454ee00d3a5ad021a5d9d76101373752d7ef7f4909f531a52b5c9b106a00
SHA51294e04b1dac6d3ac575611c93c6ee1920285d31750165afdf42ee3cef8ae12d3864cd09e62a4771950d13b47a6e2c348782d709779485a8118770100f6c0629f0
-
Filesize
255KB
MD50e2ce57d6cc69def134e2bbaf828dbad
SHA1474d332e26d2e36da4e7f31a770f656985479ae2
SHA256ba9e454ee00d3a5ad021a5d9d76101373752d7ef7f4909f531a52b5c9b106a00
SHA51294e04b1dac6d3ac575611c93c6ee1920285d31750165afdf42ee3cef8ae12d3864cd09e62a4771950d13b47a6e2c348782d709779485a8118770100f6c0629f0
-
Filesize
255KB
MD52b5d273a71023e4fef4a1101f9d90519
SHA1a2127ac67443fc4329388751d81d36da257668ea
SHA256c4337a365cde7bb5553ce4e1dbdaae734411eb918318c6df5c6222871a828b0b
SHA512f8a3d2385b9565123ca7dd0b0dd377a401c4d3a0e6199ca0a154413efd76b6c8650361e92318fe341993b227ab096f5b938dd9d296dd6133eea1d6abbe959fe0
-
Filesize
255KB
MD52b5d273a71023e4fef4a1101f9d90519
SHA1a2127ac67443fc4329388751d81d36da257668ea
SHA256c4337a365cde7bb5553ce4e1dbdaae734411eb918318c6df5c6222871a828b0b
SHA512f8a3d2385b9565123ca7dd0b0dd377a401c4d3a0e6199ca0a154413efd76b6c8650361e92318fe341993b227ab096f5b938dd9d296dd6133eea1d6abbe959fe0
-
Filesize
255KB
MD571d440198a2cb320c65b0108b364c8bd
SHA16feba010c18ff57b967d91e5e109b030bb107a4b
SHA2562820b20c347b922049740449f74547d675d25c8a0fbf5c7294e2dcd04ee7e54f
SHA5121964b526e6fa7ad57fb2ced5ac72161812b92fd0d6580cb099e38c3a4fec210db727e77c9afcca7cb8b77af034c604359c30eb7d16c98ead2c9a2d7a2a518aa9
-
Filesize
255KB
MD571d440198a2cb320c65b0108b364c8bd
SHA16feba010c18ff57b967d91e5e109b030bb107a4b
SHA2562820b20c347b922049740449f74547d675d25c8a0fbf5c7294e2dcd04ee7e54f
SHA5121964b526e6fa7ad57fb2ced5ac72161812b92fd0d6580cb099e38c3a4fec210db727e77c9afcca7cb8b77af034c604359c30eb7d16c98ead2c9a2d7a2a518aa9
-
Filesize
255KB
MD571d440198a2cb320c65b0108b364c8bd
SHA16feba010c18ff57b967d91e5e109b030bb107a4b
SHA2562820b20c347b922049740449f74547d675d25c8a0fbf5c7294e2dcd04ee7e54f
SHA5121964b526e6fa7ad57fb2ced5ac72161812b92fd0d6580cb099e38c3a4fec210db727e77c9afcca7cb8b77af034c604359c30eb7d16c98ead2c9a2d7a2a518aa9
-
Filesize
255KB
MD5895446e53bca76baed8e4b9f2a57c3ec
SHA1a27c9e94eff550714fb964a43af8524cc2df37fc
SHA2566ea84ff2c6b03c1827357934630a2633864826b7552cf5c287c57ac591e9a779
SHA512fdd3e764c6f329c84c9ca171676e24b31f722df612c3e29f992d27119342f8ef9eb8826ba48b999c2704ecae3216fa60a380174f43c391c0410ce2f2dd0aec39
-
Filesize
255KB
MD5895446e53bca76baed8e4b9f2a57c3ec
SHA1a27c9e94eff550714fb964a43af8524cc2df37fc
SHA2566ea84ff2c6b03c1827357934630a2633864826b7552cf5c287c57ac591e9a779
SHA512fdd3e764c6f329c84c9ca171676e24b31f722df612c3e29f992d27119342f8ef9eb8826ba48b999c2704ecae3216fa60a380174f43c391c0410ce2f2dd0aec39
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
255KB
MD546d81e122f253cd83c92510b03d48e59
SHA151b078071982b391bf8433ab3df86aac483ff39c
SHA25673bbd7b03ee8f529ccebbab78529aa142fe3b531b17890fac6f6669ac5be9ccd
SHA512251504357125266442f77729ac67d178532abbec8a98ff58a18866e6b69a62c0018bd77daf0f9139b530e1b7c8fd2524c80cd456c3235acef085e731fad9825f
-
Filesize
255KB
MD5b0464ebe4401c83dd9ea5f94baec23ca
SHA1aa40f470ecfef7d1cb0876a7ec1b118fa0b5cd56
SHA256e4a090e142820962178251d570daf2eed64048ce2dd9b493584523d51d161242
SHA512d194cb597d0240ec643d3b266084211ce5e222e7ae72101df7e3fe3cb7eae64a93e25bfe934636252840b5b7db64dda17247cb869a72948aa733cd2bf7cf4818
-
Filesize
255KB
MD5b0464ebe4401c83dd9ea5f94baec23ca
SHA1aa40f470ecfef7d1cb0876a7ec1b118fa0b5cd56
SHA256e4a090e142820962178251d570daf2eed64048ce2dd9b493584523d51d161242
SHA512d194cb597d0240ec643d3b266084211ce5e222e7ae72101df7e3fe3cb7eae64a93e25bfe934636252840b5b7db64dda17247cb869a72948aa733cd2bf7cf4818